Reshma, S. Shaila, K. Venugopal, K. R.
Published in
SN Computer Science
Secure data aggregation intends to reduce redundant data transmission and malicious node interference in the network. Therefore, designing secure data aggregation protocol is a crucial task in WSNs. In this paper, we have proposed a Secure Data Aggregation using Fuzzy Judgement, Pattern Category and SHAP Contribution (SDAFPS) protocol. The SDAFPS p...
Arul, E. Punidha, A.
Published in
SN Computer Science
Weak defence makes it vulnerable to multiple cloud devices, and victims often do not even know it has been compromised. Cloud assaults were planned, and the weakening of home automation and home safety technologies was addressed over a long period of time. The threats, however, were of a different kind. The target appears to be less interested in a...
Bera, Nilina Majumder, Subhashis Das, Sutirtha Mukherjee, Sweta Aryani, Neha Bhattacharya, Bhargab B.
Published in
SN Computer Science
Increased use of digital microfluidic (DMF) biochips has fueled the replacement of expensive healthcare and biochemical laboratory procedures with low-cost, fully-automated, miniaturized integrated systems. Dilution and mixing of fluid samples in a certain ratio are two fundamental primitives needed in sample preparation, which is an essential comp...
Staller, Mario S. Koerner, Swen
Published in
SN Computer Science
Gamification is regularly defined as the use of game elements in non-gaming contexts. However, discussions in the context of the pedagogical value of gamification suggest controversies on various levels. While on the one hand, the potential is seen in the design of joyful learning environments, critics point out the pedagogical dangers or the probl...
Alshaboti, Mohammed Baroudi, Uthman
Published in
SN Computer Science
Auction-based and threshold-based are the prevalent approaches for multi-robot distributed task allocation problem. We study the performance of these two approaches under a multi-objective dynamic task allocation scenario. The fuzzy inference system (FIS) is used in the auction-based approach to convert the objectives into a representative bid valu...
Yasmeen, Fauzia Uddin, Mohammad Shorif
Published in
SN Computer Science
Digital watermarking is playing a vital role in the improvement of authentication, security, and copyright protection in today’s digital transformation. The performance of this technique is shown to be impressive around the globe. Text, audio, video, and image data are acted as watermarks in the digital platform. In this article, a hybrid watermark...
Crnković, Dean Švob, Andrea
Published in
SN Computer Science
Tolerance graphs were introduced in 1982 by Golumbic and Monma as a generalization of interval graphs. In this paper, we propose several applications of tolerance graphs in fighting COVID-19. These applications include finding cliques of a certain size, and calculating the chromatic number of a graph, the problems that are in general NP-complete bu...
Zhang, Hang Zhao, Mingchang
Published in
SN Computer Science
Panoramic image stitching is to synthesize similar images into a complete image. It is one of the critical scientific issues in computer vision. It has important applications in medical imaging and virtual vision. The traditional algorithms of the panoramic image stitching mainly include three steps: (1) extract feature points; (2) match the simila...
Kassir, Mohamad Mahdi Palhang, Maziar Ahmadzadeh, Mohammad Reza
Published in
SN Computer Science
Localization is an essential step in visual navigation algorithms in robotics. Some visual navigation algorithms define the environment through sequential images, which are called visual path. The interval between each consecutive image is called a segment. One crucial step in these kinds of navigation is to find the segment in which the robot is p...
Pandit, Pramit Dey, Prithwiraj Krishnamurthy, K. N.
Published in
SN Computer Science
Prognosticating crop yield still remains as one of the challenging tasks in agriculture. Even though multiple linear regression methodology has dominated the area of predictive modelling, it is constrained to the assumption that the underlying relationship is assumed to be crisp or precise. Consequently, it often fails to provide satisfactory resul...